OpenVPN in server mode using TLS-crypt-v2 allows remote attackers to trigger a DoS by corrupting and replaying network packets in the early handshake phase
-
Looks like 24.11 is on openvpn version (2.6.12) which is in-between 2.6.1 and 2.6.13, but the vulnerability is only for TLS-crypt-v2, which I don't believe 24.11 uses nor is there an option to enabled through the GUI that I can see. But I just wanted to confirm 24.11's OpenVPN isn't affected by this.
ref: https://github.com/advisories/GHSA-5gwv-2q72-gxrmOpenVPN 2.6.12 amd64-portbld-freebsd15.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] [DCO]
library versions: OpenSSL 3.0.14 4 Jun 2024, LZO 2.10
DCO version: FreeBSD 15.0-CURRENT #0 plus-RELENG_24_11-n256407-1bbb3194162: Fri Nov 22 05:08:46 UTC 2024 root@freebsd:/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/obj/amd64/AKWlAIiM/var/jenkins/workspace/pfSense-Plus-snapshots-24_11-main/sources/FreeBS
Originally developed by James Yonan -
I believe that is not affected.
I can only see tls crypt (without V2) being enabled in my config.